Search Results - "ASCII"

Refine Results
  1. 1
  2. 2

    Encrypting text data using elliptic curve cryptography by Ali, Abas Abdullahi

    Published 2018
    “…Encrypting and decrypting any text that has an equivalent ASCII code is the core principle of this algorithm.…”
    Get full text
    Get full text
  3. 3

    Protection of text using SHA1 and Base64 by Taha, Imad, Alahmad, Mohammad, Ahmad, Hanadi

    Published 2012
    “…As an example of an ASCII code, Arabic letters are used to represent the texts. …”
    Get full text
    Get full text
  4. 4

    Data Acquisition System Based On FPGA by Mahrus, Nuril Syahira

    Published 2005
    “…To do this, the data first must be converted from the Hex code to the ASCII code. After the data has been converted to ASCII code, then it will be displayed on the LCD. …”
    Get full text
    Get full text
  5. 5

    Automatic generation of geospatial dataset (MS 1759:2004) derived from total station data / Mohd Amry Johan Mohd Ali by Mohd Ali, Mohd Amry Johan

    Published 2016
    “…The method of processing total station data using the current software in the market generate different data format such as RTF file, ASCII file and drawing file. It is not capable for direct usage in GIS environment. …”
    Get full text
  6. 6

    DNA sequences compression by GP2R and selective encryption using modified RSA technique by Hossein, Syed Mahamud, De, Debashis, Mohapatra, Pradeep Kumar Das, Mondal, Sankar Prasad, Ahmadian, Ali, Ghaemi, Ferial, Senu, Norazak

    Published 2020
    “…Firstly, it searches for the exact Genetic Palindrome(GP), Palindrome(P) and Reverse(R)[GP 2 R] and the substring is reported, which is replaced by the corresponding ASCII character creating a Library file. By using the ASCII code, the Library file acts as a signature as well as provides the security of data. …”
    Get full text
    Get full text
  7. 7

    Development of NDCDB in E-cadastral environment : case study NDCDB in area of Universiti Teknologi Mara MARA Perlis / Norsyahdira Ahmad by Ahmad, Norsyahdira

    Published 2019
    “…Indirectly, the advances in this e-TSM software also can automatically generate 16 ASCII file at the same time. So that, the advantages of this method technology to surveyor are can save time, save cost and also reduce the workforce in survey work. …”
    Get full text
  8. 8

    Non-Symbolic Fragmentation by Ashman, Helen, Coupe, Henry, Smith, Phil, Neville-Smith, Martin, Gilbert, Martyn

    Published 2002
    “…Non-symbolic fragmentation, or NSF, relies on breaking up data into non-symbolic fragments, which are (usually irregularly-sized) chunks whose boundaries do not necessarily coincide with the boundaries of the symbols making up the data. For example, ASCII data is broken up into fragments which may include 8-bit fragments but also include many other sized fragments. …”
    Get full text
  9. 9

    Secure data communication using blind source separation by Kumar, Anil, Elkhazmi, E. A., Khalifa, Othman Omran, Albagul, Abdulgani

    Published 2008
    “…In this paper, we presents a secure(noise-resistant algorithm for data communication over the noisy channel , the message is converted to non-linear Hadamard code, which is having the maximum hamming distance, which makes it more fault-tolerant in comparison to the ASCII input. The translated message is encrypted with a random signal by specific mixing. …”
    Get full text
    Get full text
  10. 10

    The usage of watermarking to store patient information and diagnosis in medical images by Razlinda , Abd Razak

    Published 2011
    “…To embed patient’s information and diagnosis, the text will convert into binary using ASCII code.…”
    Get full text
    Get full text
  11. 11

    Protection of the texts using Base64 and MD5 by Taha, Imad, Alahmad, Mohammad, Ahmad, Hanadi

    Published 2012
    “…This paper discusses an encryption method using base64, which is a set of encoding schemes that convert the same binary data to the form of a series of ASCII code. Also, The MD5 hash function is used to hash the encrypted file performed by Base64. …”
    Get full text
    Get full text
  12. 12

    Recognition of the cursive handwritten courtesy amounts of Malaysian bank cheques. by Sulaiman, Md. Nasir, Khalid, Marzuki

    Published 2001
    “…In this paper, we present techniques to recognise the cursive handwritten courtesy amount from Malaysian bank cheques and convert it into its corresponding ASCII codes. The image is pre- processed and segmented using the combination of crossed-point, curved-point and histogram techniques. …”
    Get full text
    Get full text
  13. 13

    A laser pointer communicating toy by Baharudin, Ain Najihah, Habaebi, Mohamed Hadi, Abdul Rahman, Farah Diyana

    Published 2018
    “…This paper aims to design a smart communicating toys system equipped with laser sensors that can send and receive the data message based on the conversion of data from ASCII to binary code. The system intents to offer two-ways communication toys that will be a new medium for educational purposes for kids in their developmental stages in which both players can send and receive the data to and from each other and equipped with sound indicator module to alert the player. …”
    Get full text
    Get full text
    Get full text
  14. 14

    Design Of An 8 Bit Receiver Based On FPGA by Mohammad, Haidzir

    Published 2006
    “…The Xilinx XC4010PC84 demo board will act like a receiver and display the data that computer send in ASCII character and display it by LED in binary.…”
    Get full text
    Get full text
  15. 15
  16. 16

    Design and implementation of visible light communication based toys by Baharudin, Ain Najihah, Habaebi, Mohamed Hadi, Abdul Rahman, Farah Diyana

    Published 2019
    “…This paper presents the design and implementation steps of a smart visible light communication based toy system equipped with laser sensors that can send and receive the data message based on the conversion of data from ASCII to binary code. The toy system intends to offer two-ways communication that will be a new medium for educational purposes for kids in their developmental stages in which both players can send and receive the data to and from each other toys equipped with sound indicator module to alert the player. …”
    Get full text
    Get full text
    Get full text
  17. 17

    Passphrase with semantic noises and a proof on its higher information rate by Lee, Kok-Wah, Ewe, Hong-Tat

    Published 2007
    “…Here, stronger forms of passphrases using textual semantic noises like punctuation marks, mnemonic substitution, misspelling, and associative morphing, which improve the key entropy, are proposed An ASCII mutual substitution table is presented together with its proof on information rate increment. …”
    Get full text
  18. 18

    The information system project profiles among universities in Indonesia by Ahlan, Abdul Rahman, Subiyakto, A'ang, Kartiwi, Mira, Hakiem, Nashrul, Huda, Qomarul M, Susanto, Aries

    Published 2018
    “…The higher education database of the Ministry of Research, Technology, and Higher Education (MRTHE) and the Association of Computing and Informatics Institutions Indonesia (ASCII-I) in the year 2015 were used for selecting around 1.230 respondents based on a purposive random sampling. …”
    Get full text
    Get full text
    Get full text
  19. 19

    Design of prototype expert system for transliterating Arabic-to-Roman words by Ayob, M. Z., Ismail, Ahmad Faris

    Published 2006
    “…Character code mappings between the 8-bit Arabic character codes and the more 'conventional' 7-bit ASCII have been performed. The problem of rendering Arabic letters has been solved via the use of WinXP Arabic as the platform for the VB program. …”
    Get full text
    Get full text
  20. 20

    A carbon conductive filament-induced robust resistance switching behavior for brain-inspired computing by Yu, Tianqi, Wang, Dong, Liu, Min, Lei, Wei, Shafie, Suhaidi, Mohtar, Mohd Nazim, Jindapetch, Nattha, van Paphavee, Dommelen, Zhao, Zhiwei

    Published 2024
    “…The demodulation and storage functions of the American Standard Code for Information Interchange (ASCII) are demonstrated by programmable pulse modulation. …”
    Get full text